2009 |
13 | EE | Cheul Rhee,
Junghoon Moon,
G. Lawrence Sanders,
Youngchan Choe:
Benchmarking Technique in E-Business Using the Galileo Method.
HICSS 2009: 1-10 |
2007 |
12 | EE | Jessica Pu Li,
Seungkyoon Shin,
G. Lawrence Sanders:
Prediction of Information Sharing Behavior in China: Understanding the Cultural and Social Determinants.
HICSS 2007: 187 |
2006 |
11 | EE | Seungkyoon Shin,
G. Lawrence Sanders:
Denormalization strategies for data retrieval from data warehouses.
Decision Support Systems 42(1): 267-282 (2006) |
2005 |
10 | EE | Yong Jin Kim,
Rajiv Kishore,
G. Lawrence Sanders:
From DQ to EQ: understanding data quality in the context of e-business systems.
Commun. ACM 48(10): 75-81 (2005) |
9 | EE | Edward J. Garrity,
Bonnie Glassberg,
Yong Jin Kim,
G. Lawrence Sanders,
Seungkyoon Shin:
An experimental investigation of web-based information systems success in the context of electronic commerce.
Decision Support Systems 39(3): 485-503 (2005) |
2004 |
8 | EE | Seungkyoon Shin,
Ram D. Gopal,
G. Lawrence Sanders,
Andrew B. Whinston:
Global software piracy revisited.
Commun. ACM 47(1): 103-107 (2004) |
2003 |
7 | EE | Sudip Bhattacharjee,
Ram D. Gopal,
G. Lawrence Sanders:
Digital music and online sharing: software piracy 2.0?
Commun. ACM 46(7): 107-111 (2003) |
2002 |
6 | EE | Yong Jin Kim,
G. Lawrence Sanders:
Strategic actions in information technology investment based on real option theory.
Decision Support Systems 33(1): 1-11 (2002) |
2001 |
5 | EE | G. Lawrence Sanders,
Seungkyoon Shin:
Denormalization Effects on Performance of RDBMS.
HICSS 2001 |
4 | EE | James F. Courtney,
G. Lawrence Sanders:
Introduction.
Information Systems Frontiers 3(1): 5-6 (2001) |
3 | EE | C. West Churchman,
James F. Courtney,
G. Lawrence Sanders:
Introduction.
Information Systems Frontiers 3(2): 139-141 (2001) |
2000 |
2 | EE | Ram D. Gopal,
G. Lawrence Sanders:
Global software piracy: you can't get blood out of a turnip.
Commun. ACM 43(9): 82-89 (2000) |
1992 |
1 | | Ram D. Gopal,
G. Lawrence Sanders:
The Effect of Preventive and Deterrent Software Piracy Strategies on Producer Profits.
ICIS 1992: 161-170 |